analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Chew7.exe

Full analysis: https://app.any.run/tasks/633c7f35-22ac-4433-8808-62049be1fa75
Verdict: Malicious activity
Analysis date: January 23, 2019, 05:53:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

7B232997942B2A5C7E4DBE931BB4C67C

SHA1:

06C6D3B5B66585F03BAB25C774BAADB575CB1515

SHA256:

0A88FAA27484C7C163BC90FBF806A9DAB84226C2F60F3410695278EE76D065F5

SSDEEP:

98304:6BkL7VOQCsDdOmYglo4Y14pygKq7VOQCsDdOmYglo4Y14pygK:6OLPLDVYglq1pqPLDVYglq1p

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • hale.exe (PID: 2580)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • hale.exe (PID: 2580)
      • cmd.exe (PID: 3692)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 2852)
      • cmd.exe (PID: 3692)
      • cmd.exe (PID: 3480)
      • cmd.exe (PID: 3888)
      • cmd.exe (PID: 2708)
    • Executable content was dropped or overwritten

      • Chew7.exe (PID: 3760)
      • hale.exe (PID: 2580)
    • Application launched itself

      • cmd.exe (PID: 3692)
    • Uses ICACLS.EXE to modify access control list

      • cmd.exe (PID: 3692)
    • Uses TASKLIST.EXE to query information about running processes

      • cmd.exe (PID: 3692)
    • Creates files in the Windows directory

      • Chew7.exe (PID: 3760)
    • Uses TASKKILL.EXE to kill process

      • Chew7.exe (PID: 3760)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (43.2)
.exe | Win64 Executable (generic) (16.2)
.exe | UPX compressed Win32 Executable (15.9)
.exe | Win32 EXE Yoda's Crypter (15.6)
.dll | Win32 Dynamic Link Library (generic) (3.8)

EXIF

EXE

AssemblyVersion: 0.0.0.0
ProductVersion: 1.1.0.0
ProductName: Chew7 v1.1
OriginalFileName: Chew7.exe
LegalCopyright: © Chew7. All rights reserved.
InternalName: Chew7.exe
FileVersion: 0.6.8.4
FileDescription: The Science of Activation
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 1.1.0.0
FileVersionNumber: 0.6.8.4
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x47c7fe
UninitializedDataSize: -
InitializedDataSize: 108032
CodeSize: 4696576
LinkerVersion: 8
PEType: PE32
TimeStamp: 2010:08:01 23:59:57+02:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
67
Monitored processes
31
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start chew7.exe no specs chew7.exe taskkill.exe no specs taskkill.exe no specs hale.exe cmd.exe no specs reg.exe no specs find.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs tasklist.exe no specs find.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs find.exe no specs takeown.exe no specs icacls.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3324"C:\Users\admin\Downloads\Chew7.exe" C:\Users\admin\Downloads\Chew7.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
The Science of Activation
Exit code:
3221226540
Version:
0.6.8.4
3760"C:\Users\admin\Downloads\Chew7.exe" C:\Users\admin\Downloads\Chew7.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
The Science of Activation
Version:
0.6.8.4
2684"C:\Windows\System32\taskkill.exe" /f /im cmd.exeC:\Windows\System32\taskkill.exeChew7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3040"C:\Windows\System32\taskkill.exe" /f /im hale.exeC:\Windows\System32\taskkill.exeChew7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2580"C:\Windows\system32\hale.exe" C:\Windows\system32\hale.exe
Chew7.exe
User:
admin
Integrity Level:
HIGH
3692cmd /c ""C:\Users\admin\AppData\Local\Temp\3121.tmp\hale.cmd" "C:\Windows\system32\cmd.exehale.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2620REG QUERY HKEY_LOCAL_MACHINE\SOFTWAREC:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2748FIND /I "HKEY_LOCAL_MACHINE\SOFTWARE\Chew7"C:\Windows\system32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2972REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Chew7 /fC:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3888C:\Windows\system32\cmd.exe /c REG QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Chew7 /v CWInstalledC:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
463
Read events
453
Write events
10
Delete events
0

Modification events

(PID) Process:(3760) Chew7.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3760) Chew7.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2580) hale.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2580) hale.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:Key:HKEY_LOCAL_MACHINE\SOFTWARE\Chew7
Operation:writeName:
Value:
(PID) Process:Key:HKEY_LOCAL_MACHINE\SOFTWARE\Chew7
Operation:writeName:LastAttempt
Value:
install
Executable files
11
Suspicious files
0
Text files
19
Unknown types
0

Dropped files

PID
Process
Filename
Type
2580hale.exeC:\Users\admin\AppData\Local\Temp\3121.tmp\plat.cmdtext
MD5:18E656CB3DD56AF78AC3C58C7018145A
SHA256:A18F490DFE451F8C14EAF07951292CC45318073DDBAC65B18831668F48D811B2
2580hale.exeC:\Users\admin\AppData\Local\Temp\3121.tmp\mtmp.cmdtext
MD5:02D7EBAD35B5624A751243D101A540CE
SHA256:7686C1B97D3F80D042AAC35D82B5E5B558A494AE3E0E35DE81A47C413D9020AC
2580hale.exeC:\Users\admin\AppData\Local\Temp\3121.tmp\postw.cmdtext
MD5:C794EC73494F3AEC4067E8BDC954B53F
SHA256:F646BCC720792EEF578FA4F6298A272FD43EC49CAD664D1D06F963B812D9F589
2580hale.exeC:\Users\admin\AppData\Local\Temp\3121.tmp\intv.cmdtext
MD5:3AB983628DA0FD9F8AFD497D07F33D76
SHA256:97754BA105CD61128EBEF8AAB5272F669A72B64F44B6D861C8D507C088410A27
2580hale.exeC:\Users\admin\AppData\Local\Temp\3121.tmp\pendx.cmdtext
MD5:3AF31A071967EC43A0AC6E3605FF1D8C
SHA256:A0197323DA44005AEC9726CABAEE9F1027FA07EB5367F3FCEAAD05E3728C0324
2580hale.exeC:\Users\admin\AppData\Local\Temp\3121.tmp\hash.cmdtext
MD5:467B51F35949C5A3F722BA736CE920E4
SHA256:6C28FA6BF656B77085B464485FD085D4D6EEB7E3A0FF2DFF690DC813B492580C
2580hale.exeC:\Users\admin\AppData\Local\Temp\3121.tmp\hale.cmdtext
MD5:6CE66570BFAB35A20D280D9833049E97
SHA256:C755237B5C58134FF21520F7D2D401E5C9AD40D05DC76FE317FFD238ECAFECF2
2580hale.exeC:\Users\admin\AppData\Local\Temp\3121.tmp\tick.cmdtext
MD5:D32C42E48DDEE14FDDD78BAE6866CFC2
SHA256:7BA5AF7F29496E9C5EB780CD484623ECAF0443299EA9693261516DFB60401266
2580hale.exeC:\Users\admin\AppData\Local\Temp\3121.tmp\plog.cmdtext
MD5:D638644C3BB80F1E98AE06FA85680EB1
SHA256:E8A990623424631496704087D29F05300BC5EFABB47C94FFE7F6BD46D803B587
2580hale.exeC:\Users\admin\AppData\Local\Temp\3121.tmp\lhed.cmdtext
MD5:34670DB25D9AFD4F3912F77F2E5C7D08
SHA256:A4761B5A5F5E6542867BA1CAA87676410B7AEDCCD762826359046167771659FF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info